Facebook has its advantages, but also its negative side. Apart from the fact that your boss can see you weren’t actually sick that day last week because of your status…
Security researchers found dozens of high risk security holes in the software used to run specific Android mobile devices, but that’s still a lot better than industry averages, according to…
SQL Server fingerprinting can be a time consuming process. It involves a lot many trial and error methods to fingerprint the exact SQL Server version. Intentionally inserting an invalid input…
Google has unveiled a new program to pay between $500 and $3,133 to people who discover security vulnerabilities in its websites and online applications. “We hope our new program will…
Attackers are constantly changing their tactics and adapting to what the security community and researchers are doing, and it’s not unusual for the bad guys to adopt techniques used by…
There’s a new flaw in all of the current versions of Internet Explorer that is being used in some targeted attacks right now. Microsoft has confirmed the bug and said…
The IT security industry is no stranger to urban myths: stories that spread and, over time, become accepted as general truths. Global IT vendor Panda Security has been asking its…
Back in 2007, the Burmese government reportedly severed the country’s Internet links in a crackdown over growing political unrest. Yesterday, Burma once again fell off the Internet. Over the last…
INSECURITY VENDOR Kaspersky Labs suffered a shocker over the weekend with the firm’s US website getting hacked.
Once again WiFi security is in the news, this time a new report in the UK shows that almost half of UK home WiFi networks could be compromised within 5…